SlideShare a Scribd company logo
ATTRIBUTE BASED ENCRYPTION IN CLOUD COMPUTING WITH
OUTSOURCED REVOCATION
Manvitha Varsha1
, T. Sree Lakshmi2
1
M.Tech., PG Scholar, Dept of CSE, Korm College of Engineering, Kadapa,Andhra Pradesh.
2
Associate Professor, Dept of CSE,Korm College of Engineering, Kadapa, Andhra Pradesh.
ABSTRACT:
Public key infrastructure (PKI) is an alternate option to public key encryption where as the Identity-Based
Encryption IBE is public key and certificate management. The main disadvantage of IBE during revocation is the
overhead computation at private key generator (PKG).In this paper, going for survey on distinct method for
handling the basic issue of Identity renouncement. Identity Based Encryption (IBE) simplifies public key
management and certificate management at Public Key Infrastructure (PKI) with help of Private Key Generator
(PKG). However,one of the main drawback of IBE is overheaded computation at PKG during user revocation.
The use of Key update cloud service provider (KU-CSP) offloads most of key generation operations during key-
issuing and key-update process leaving only a number of simple operations for PKG and users to perform
locally.For this,we generate a hybrid private key for each user, in which an AND gate is used to connect and
bound the identity component and time component.But KU-CSP is untrusted. So, we propose a Pseudonym
Generation Scheme for Identity based Encryption and Outsourced Revocation in Cloud Computing. We also
discussed our proposed work which bring outsourcing calculation into IBE interestingly and propose a revocable
IBE plan in the server-helped setting. Our plan offloads a large portion of the key era related operations amid key-
issuing and key-redesign forms to a Key Update Cloud Service Provider, leaving just a consistent number of basic
operations for PKG and clients to perform locally. Moreover, we propose another development which is provable
secure under the as of late formulized Refereed handing over of Computation model. We also discussed our
proposed work which bring outsourcing calculation into IBE interestingly and propose a revocable IBE plan in
the server-helped setting. Our plan offloads a large portion of the key era related operations amid key-issuing and
key-redesign forms to a Key Update Cloud Service Provider, leaving just a consistent number of basic operations
for PKG and clients to perform locally. Moreover, we propose another development which is provable secure
under the as of late formulized Refereed handing over of Computation model.
Index Terms-
1. INTRODUCTION
Identity based encryption system allow any user to
generate a public key from a known identity value such
as an ASCII string. There is trusted third party, called
the Private Key Generator (PKG), who generates the
corresponding private keys. For encryption and
decryption operations, PKG first publishes a master
public key, and then generate the
corresponding master private key (referred as master
key). Using this master public key, any user can
generate a public key corresponding to the identity by
combining the master public key with the identity
value. To get a corresponding private key, authorized
user can use identity ID contacts PKG, which uses the
master private key to generate private key for identity
ID. As a result, user can encrypt messages with no prior
distribution of keys between participants. This is very
useful in cases where predistribution of keys is
inconvenient because of technical restraints. However,
for decryption of message, the authorized user must
obtain an appropriate private key from PKG. In this
approach the problem is that PKG must be highly
trusted, as it has ability to generate any users private key
and decryption of message without authorization.
Because any user’s private key can be generated using
third party’s secret, this system has inherent key
assurance. A different systems have been proposed
which remove this including certificate-based
encryption and secure key issuing cryptography. In PKI
setting, revocation is done by appending validity
periods to certificates or using combinations of
techniques. But, this require management of certificates
which is precisely the burden that IBE strives to
alleviate. Boneh and Franklin suggested that their
private keys can renewed by user periodically and
senders use receivers identity with current time
period.But this mechanism would results in an
overhead at PKG. In another word, all the users even
though their keys have been revoked or not, have to
contact with private key generator( PKG) periodically
to prove their identities and update new private keys. It
is needed that PKG must be online and the secure
channel has to be maintained for all the transactions,
which will become a bottleneck for IBE system as the
number of users grows. Many businesses large and
ISBN-13: 978-1537584836
www.iaetsd.in
Proceedings of ICAER-2016
©IAETSD 201615
small use cloud computing today either directly or
indirectly instead of traditional onsite alternatives.
There are a number of reasons like Reduction of
costs,Universal access and many more because of
which cloud computing is so widely used among
businesses today. Thus it require a new working
paradigm for introducing cloud services into IBE
revocation to fix the issue of efficiency and storage
overhead. A naive approach is hand over the private key
generators (PKG) master key to the Cloud Service
Providers (CSPs). The CSPs then simply update all
private keys by using the traditional key update
technique and transfer the private keys to unrevoked
users. However, this approach is based on an unrealistic
assumption that CSPs are fully trusted and are allowed
to access the master key for IBE system. But, in practice
the public clouds are likely outside of the same trusted
domain of users and are curious about users individual
privacy. For this reason, a challenge is how to design a
secure revocable IBE scheme so that we can reduce the
overhead computation at PKG with an untrusted CSP is
raised.
II. RELATED WORK
A Identity-Based Encryption (IBE) is an interesting
alternative to public key encryption, which simplify
key management in a certificate-based Public Key
Infrastructure (PKI) with use of human-intelligible
identities (e.g., unique name, IP address ,email
address,, etc) as a public keys. D. Boneh and M.
Franklin propose a fully functional identity-based
encryption scheme (IBE). The scheme has chosen
ciphertext security in the random oracle model
assuming an elliptic curve variant of the
computational Diffie-Hellman problem. System is
based on the Weil pairing and give precise definitions
for secure identity based encryption schemes and give
several applications for such systems[1]. A. Sahai and
B. Waters introduce a new type of Identity-Based
Encryption (IBE) scheme that we call Fuzzy Identity-
Based Encryption. In Fuzzy IBE an identity Is viewed
as set of descriptive attributes. A Fuzzy IBE scheme
allows for a private key for an identity, ID, to decrypt
a cipher text encrypted with an identity, ID’ , if and
only if the identities ID and ID’,are close to each other
as measured by the set overlap distance metric[2]. The
availability of fast and reliable Digital Identities is an
essential ingredient for the successful implementation
of the public-key infrastructure of the Internet. All
digital identity schemes must include a method for
revoking someone’s digital identity in the case that
this identity is stolen (or canceled) before its
expiration date (similar to the cancelation of a credit-
cards in the case that they are stolen). W. Aiello, S.
Lodha, and R. Ostrovsky proposed an elegant method
of identity revocation which requires very little
communication between users and verifiers in the
system They reduced the overall CA to Directory
communication, while still maintaining the same tiny
user to vendor communication[3]..
III.PROPOSED SYSTEM
The proposed system is Pseudonym Generation
Scheme with Combining the Identity based encryption
and
Attribute-based Encryption with Outsourced
Revocation in Cloud Computing. we use multiple KU-
CSP for key updation. For data security, use an efficient
encryption algorithm. For integrity checking, generate
meta data before upload the data in cloud. Using the
meta data the integrity of the file is verified. In
proposed work, we design a method in which each user
takes a different pseudonym when accessing cloud
services. There is almost no relationship between a user
identity and a corresponding pseudonym is provided,
and no relationship is provided between the
pseudonyms for a single. Pseudonym use will not affect
users attestation also reduces the amount of input data
representing private
user information thus making it almost impossible for
attackers to attack on users. In cloud data is stored
remotely, user is not aware of any security threat. Data
modification can done by the untrusted server
,unauthorized user or by some malicious activity. So
user needs to be ensured that their data are intact. For
this it is important to check integrity of data. for this
proposed system generate meta data and using this meta
data we examine the accuracy of data.
Proposed Algorithms :
Pseudonym Generation algorithm
1.User Identity ID is given as intial input.
2.check wether pseudonym is already generated or not.
3.If yes then give message pseudonym is already
generated.
4.If not chose type of pseudonym
Alpha/Numeric/Alphanumeric.
5.Use random function to generate random number.
6.Generate pseudonym using random number generated
in step 5.
7.Return pseudonym.
Key Generation Algorithm
1.select randomly two large prime number p,q
2.Compute n=p*q. Where n is modulus used to generate
public key and private key.
3.Compute the function as Ψ(n) = (p*1)(q*1).
4.Select any random number e between 1 and (n) the
function value previously calculated in step
3 such that the number is co-prime to '(n) and is not
divisor of Ψ (n).
5.Calculate d,which represent modular multiplicative
ISBN-13: 978-1537584836
www.iaetsd.in
Proceedings of ICAER-2016
©IAETSD 201616
inverse of e mod Ψ (n).
i.e d should satisfy equation e*d mod Ψ (n) =1.
6.private key is represented by d calculated in step 5.
V.RESULTS
In this section we present the Module description, how
it works, practical results and environment. Pseudonym
Generation : we generate pseudonym for each user. It
take users identity and provide
pseudonym.Pseudonyms are usually taken or adopted to
hide an individual ones real identity, for example
writers’ pen names, or terrorists, and computer hackers
fake names. Actors, musicians, and other performers
sometimes uses stage names, for example, to hide their
ethnic backgrounds. Here we use pseudonym for hide
users real identity. Because KU-CSP is untrusted. So
adversaries can use the data without permission based
on users identity. So we generate pseudonym.
Key Generation : For each users private key request on
identity ID, PKG firstly checks whether the request
identity ID exists in revocation list RL, if so the key
generation is aborted. then it generates Private Key (PK)
and Outsourcig Key (OK).finally, it sends Private Key
to user and Pseudonym with Outsourcing key to KU-
CSP respectively.
Encryption : user wants to upload any file or message to
KUCSP. But KU-CSP is untrusted. So encryption is
compulsory.for security we use attribute based
encryption with identity based encryption scheme.Here
a user can encrypt a message M under Pseudonym P
with attributes and time period Ti. This provides the
ciphertext (CT). Then user can upload this ciphertext to
KU-CSP.
Decryption : user wants to download any file or
message from KU-CSP.user uses his private key send
by PKG and decrypt the message. Here the ciphertext
CT is encrypted under P with attributes and Ti, and the
user has a private key PK, this provides original
message M.
Revocation : If the private keys of some users get
compromised, PKG must provide a mean to revoke
such users from system.If users with identities in the set
that are to be revoked at time period Ti, PKG updates
the revocation list as RL as well as the time list TL
through linking the newly created time period Ti+1 onto
original list TL. Finally send a copy for the updated
revocation list RL as well as the new time period Ti+1
to KU-CSP.
Key Updation : Upon receiving a key-update request on
pseudonym, firstly KU-CSP checks whether ID exists in
the revocation list RL, if so KU-CSP returns null and
key-update is aborted. Otherwise it returns Updated Key
(TK) and keyupdate is KU-CSP fetches the
corresponding entry Id with outsourcing key in the user
list UL. In this section we provide the Results on basis of
Construction of Proposed system. We evaluate Time
required to respond by single CSP compared to time
required by multiple CSP.
VI.CONCLUSION AND FUTURE
Focusing on issue of identity revocation, we have
introduced outsourcing computation into IBE and
proposed a revocable scheme in which the revocation
operations are delegated to CSP. User needs not to
contact with PKG during key-update, in other words,
PKG is allowed to be offline after sending the
revocation list to KU-CSP. It do not require secure
channel or user authentication during key-update
between user and KU-CSP. Furthermore as KUCSP
is untrusted we use pseudonym for each user so that
adversary can not get real identity of user.we
combine the Identitybased and Attribute-based
Encryption which will provide more security to
user.For integrity checking, generate meta data
before upload the data in cloud. Using this meta data
the integrity of the file is verified
REFERENCES
[1] W Aiello, S Lodha, & R Ostrovsky. (1998). Fast
digital identity revocation. Advances in
Cryptology – CRYPTO’98. Springer.
[2] V Goyal. (2007). Certificate revocation using fine
grained certificate space partitioning. Financial
Cryptography and Data Security (LNCS). Berlin:
Springer. Vol. 4886, pp. 247–259.
[3] F Elwailly, C Gentry, & Z Ramzan. (2004).
Quasimodo: Efficient certificate validation and
revocation. Public Key Cryptography (LNCS). Berlin:
Springer. Vol. 2947, pp. 375–388.
[4] D Boneh, & M Franklin. (2001). Identity-based
encryption from the weil pairing. Advances in
Cryptology – CRYPTO 2001 (LNCS). Berlin:
Springer. Vol. 2139, pp. 213–229.
[5] A Boldyreva, V Goyal, & V Kumar. (2008).
Identity-based encryption with efficient revocation.
ISBN-13: 978-1537584836
www.iaetsd.in
Proceedings of ICAER-2016
©IAETSD 201617
In: Proceedings of the 15th ACM Conf. on Comp. and
Comm. Security. NewYork: ACM. pp.
417–426.
[6] A Sahai, & B Waters. (2005). Fuzzy identity-based
encryption. Advances in Cryptology
EUROCRYPT 2005 (LNCS). Berlin: Springer. Vol.
3494, pp. 557–557.
[7] R Canetti, B Riva, & GN Rothblum. (2011). Two 1-
round protocols for delegation of
computation. Cryptology ePrint Archive, Report
2011/518.
[8] U Feige, & J Kilian. (1997). Making games short.
Proceedings of the 29th annual ACM Symp. on
Theory of Computing. New York: ACM. pp. 506–516.
[9] S Hohenberger, & A Lysyanskaya. (2005). How to
securely outsource cryptographic
computations. Proceedings of the 2nd Inter. Conf. on
Theory of Cryptography. Berlin: Springer-
Verlag. pp. 264–282.
[10] R Canetti, B Riva, & G Rothblum. (2012). Two
protocols for delegation of computation.
Information Theoretic Security (LNCS). Berlin:
Springer. Vol. 7412, pp. 37–61.
[11] X Chen, J Li, J Ma, Q Tang, & W Lou. (2012).
New and secure outsourcing algorithms of
modular exponentiations. 17th European Symp. on
Research in Computer Security, 2012.
[12] MJ Atallah, & KB Frikken. (). Securely
outsourcing linear algebra computations. Proceedings
of the 5th ACM Symp. on Information, Computer and
Communications Security. New York:
ACM. pp. 48–59.
[13] A Shamir. (1985). Identity-based cryptosystems
and signature schemes. Advances in
Cryptology – CRYPTO (LNCS). Berlin: Springer. Vol.
196, pp. 47–53.
[14] C Cocks. (2001). An identity based encryption
scheme based on quadratic residues.
Cryptography and Coding (LNCS). Berlin: Springer.
Vol. 2260, pp. 360–363.
ISBN-13: 978-1537584836
www.iaetsd.in
Proceedings of ICAER-2016
©IAETSD 201618

More Related Content

PDF
Identity based encryption with outsourced revocation in cloud computing
PDF
An Overview of Identity Based Encryption
DOCX
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
DOCX
Identity based encryption with outsourced revocation in cloud computing
PDF
Identity based encryption with cloud revocation authority and its applications
DOCX
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
PDF
Identity-Based Encryption with Outsourced Revocation in Cloud Computing
PDF
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...
Identity based encryption with outsourced revocation in cloud computing
An Overview of Identity Based Encryption
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with cloud revocation authority and its applications
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
Identity-Based Encryption with Outsourced Revocation in Cloud Computing
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...

What's hot (17)

DOC
documentation for identity based secure distrbuted data storage schemes
DOCX
Identity based encryption with outsourced revocation in cloud computing
DOCX
Identity based proxy-oriented data uploading and remote data integrity checki...
PDF
A Survey on Identity Based Encryption in Cloud Computing
PDF
Distributed private key generator in ibc
DOCX
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
DOCX
Cost effective authentic and anonymous data sharing with forward security
DOCX
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
PDF
Cost effective authentic and anonymous data sharing with forward security
PDF
A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...
PDF
Efficient and Enhanced Proxy Re Encryption Algorithm for Skyline Queries
PDF
Application of CP-ABE Scheme in Data Sharing System for confidentiality
PDF
Ijcnc050205
PDF
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
PDF
Attribute-Based Data Sharing
DOCX
Identity based encryption with outsourced revocation in cloud computing
PDF
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
documentation for identity based secure distrbuted data storage schemes
Identity based encryption with outsourced revocation in cloud computing
Identity based proxy-oriented data uploading and remote data integrity checki...
A Survey on Identity Based Encryption in Cloud Computing
Distributed private key generator in ibc
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
Cost effective authentic and anonymous data sharing with forward security
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
Cost effective authentic and anonymous data sharing with forward security
A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...
Efficient and Enhanced Proxy Re Encryption Algorithm for Skyline Queries
Application of CP-ABE Scheme in Data Sharing System for confidentiality
Ijcnc050205
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
Attribute-Based Data Sharing
Identity based encryption with outsourced revocation in cloud computing
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
Ad

Viewers also liked (18)

PDF
iaetsd Isolation of cellulose from non conventional source and its chemical m...
PDF
Iaetsd fuzzy logic control of statcom for voltage regulation
PDF
Iaetsd a modified image fusion approach using guided filter
PDF
3 iaetsd semantic web page recommender system
PDF
iaetsd Unmanned aerial vehicle in the field of agriculture
PDF
Iirdem design and analysis of a smart helmet gsm based system against drunken...
PDF
Iaetsd catalytic fuel converters [cfc]
PDF
Iaetsd designing of cmos image sensor test-chip and its characterization
PDF
iaetsd Co extracting opinion targets and opinion words from online reviews ba...
PDF
Iaetsd study of cracks in structural concrete
PDF
Iirdem design and implementation of finger writing in air by using open cv (c...
PDF
Iaetsd march c algorithm for embedded memories in fpga
PDF
Iaetsd vlsi architecture for exploiting carry save arithmetic using verilog hdl
PDF
Iaetsd survey on big data analytics for sdn (software defined networks)
PDF
Iaetsd glitch free nand based digitally controlled delay lines using low power
PDF
Iaetsd solar based energy efficient system
PDF
Iaetsd mapreduce streaming over cassandra datasets
PDF
Iaetsd fpga implementation of cordic algorithm for pipelined fft realization and
iaetsd Isolation of cellulose from non conventional source and its chemical m...
Iaetsd fuzzy logic control of statcom for voltage regulation
Iaetsd a modified image fusion approach using guided filter
3 iaetsd semantic web page recommender system
iaetsd Unmanned aerial vehicle in the field of agriculture
Iirdem design and analysis of a smart helmet gsm based system against drunken...
Iaetsd catalytic fuel converters [cfc]
Iaetsd designing of cmos image sensor test-chip and its characterization
iaetsd Co extracting opinion targets and opinion words from online reviews ba...
Iaetsd study of cracks in structural concrete
Iirdem design and implementation of finger writing in air by using open cv (c...
Iaetsd march c algorithm for embedded memories in fpga
Iaetsd vlsi architecture for exploiting carry save arithmetic using verilog hdl
Iaetsd survey on big data analytics for sdn (software defined networks)
Iaetsd glitch free nand based digitally controlled delay lines using low power
Iaetsd solar based energy efficient system
Iaetsd mapreduce streaming over cassandra datasets
Iaetsd fpga implementation of cordic algorithm for pipelined fft realization and
Ad

Similar to iaetsd Robots in oil and gas refineries (20)

PDF
R180203114117
PDF
Identity based Encryption Utilizing Revocable Capacity of Distributed Computi...
DOCX
Identity based encryption with outsourced
DOCX
Identity-Based Encryption with Outsourced Revocation in Cloud Computing
DOCX
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
PDF
Identity based encryption with cloud revocation authority and its applications
PDF
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
DOCX
Identity based encryption with outsourced revocation in cloud computing
PDF
IRJET- Redsc: Reliablity of Data Sharing in Cloud
PPTX
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
PDF
IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...
PDF
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
PDF
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
PPTX
Attribute based encryption in cloud with significant reduction reviw2
PDF
Outsourced kp abe with chosen ciphertext security
PDF
Cloud Data Security and Secure Data Sharing Methods
PDF
Flexible and fine grained attribute-based data storage in cloud computing
PDF
Flexible and fine grained attribute-based data storage in cloud computing
PDF
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
PDF
C04932125
R180203114117
Identity based Encryption Utilizing Revocable Capacity of Distributed Computi...
Identity based encryption with outsourced
Identity-Based Encryption with Outsourced Revocation in Cloud Computing
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
Identity based encryption with cloud revocation authority and its applications
Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encrypt...
Identity based encryption with outsourced revocation in cloud computing
IRJET- Redsc: Reliablity of Data Sharing in Cloud
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
Attribute based encryption in cloud with significant reduction reviw2
Outsourced kp abe with chosen ciphertext security
Cloud Data Security and Secure Data Sharing Methods
Flexible and fine grained attribute-based data storage in cloud computing
Flexible and fine grained attribute-based data storage in cloud computing
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
C04932125

More from Iaetsd Iaetsd (20)

PDF
iaetsd Survey on cooperative relay based data transmission
PDF
iaetsd Software defined am transmitter using vhdl
PDF
iaetsd Health monitoring system with wireless alarm
PDF
iaetsd Equalizing channel and power based on cognitive radio system over mult...
PDF
iaetsd Economic analysis and re design of driver’s car seat
PDF
iaetsd Design of slotted microstrip patch antenna for wlan application
PDF
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
PDF
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
PDF
Fabrication of dual power bike
PDF
Blue brain technology
PDF
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
PDF
iirdem Surveillance aided robotic bird
PDF
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
PDF
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
PDF
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
PDF
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
PDF
iaetsd Shared authority based privacy preserving protocol
PDF
iaetsd Secured multiple keyword ranked search over encrypted databases
PDF
iaetsd Modeling of solar steam engine system using parabolic
PDF
iaetsd Effect of superconducting fault current limiter (sfcl) on triumphant i...
iaetsd Survey on cooperative relay based data transmission
iaetsd Software defined am transmitter using vhdl
iaetsd Health monitoring system with wireless alarm
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Design of slotted microstrip patch antenna for wlan application
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
Fabrication of dual power bike
Blue brain technology
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem Surveillance aided robotic bird
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iaetsd Shared authority based privacy preserving protocol
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Effect of superconducting fault current limiter (sfcl) on triumphant i...

Recently uploaded (20)

PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PDF
Digital Logic Computer Design lecture notes
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
Lecture Notes Electrical Wiring System Components
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPT
Drone Technology Electronics components_1
PPTX
additive manufacturing of ss316l using mig welding
PDF
ETO & MEO Certificate of Competency Questions and Answers
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
Welding lecture in detail for understanding
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Digital Logic Computer Design lecture notes
CH1 Production IntroductoryConcepts.pptx
Strings in CPP - Strings in C++ are sequences of characters used to store and...
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Lecture Notes Electrical Wiring System Components
Embodied AI: Ushering in the Next Era of Intelligent Systems
Drone Technology Electronics components_1
additive manufacturing of ss316l using mig welding
ETO & MEO Certificate of Competency Questions and Answers
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Lesson 3_Tessellation.pptx finite Mathematics
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Welding lecture in detail for understanding
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
UNIT-1 - COAL BASED THERMAL POWER PLANTS
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd

iaetsd Robots in oil and gas refineries

  • 1. ATTRIBUTE BASED ENCRYPTION IN CLOUD COMPUTING WITH OUTSOURCED REVOCATION Manvitha Varsha1 , T. Sree Lakshmi2 1 M.Tech., PG Scholar, Dept of CSE, Korm College of Engineering, Kadapa,Andhra Pradesh. 2 Associate Professor, Dept of CSE,Korm College of Engineering, Kadapa, Andhra Pradesh. ABSTRACT: Public key infrastructure (PKI) is an alternate option to public key encryption where as the Identity-Based Encryption IBE is public key and certificate management. The main disadvantage of IBE during revocation is the overhead computation at private key generator (PKG).In this paper, going for survey on distinct method for handling the basic issue of Identity renouncement. Identity Based Encryption (IBE) simplifies public key management and certificate management at Public Key Infrastructure (PKI) with help of Private Key Generator (PKG). However,one of the main drawback of IBE is overheaded computation at PKG during user revocation. The use of Key update cloud service provider (KU-CSP) offloads most of key generation operations during key- issuing and key-update process leaving only a number of simple operations for PKG and users to perform locally.For this,we generate a hybrid private key for each user, in which an AND gate is used to connect and bound the identity component and time component.But KU-CSP is untrusted. So, we propose a Pseudonym Generation Scheme for Identity based Encryption and Outsourced Revocation in Cloud Computing. We also discussed our proposed work which bring outsourcing calculation into IBE interestingly and propose a revocable IBE plan in the server-helped setting. Our plan offloads a large portion of the key era related operations amid key- issuing and key-redesign forms to a Key Update Cloud Service Provider, leaving just a consistent number of basic operations for PKG and clients to perform locally. Moreover, we propose another development which is provable secure under the as of late formulized Refereed handing over of Computation model. We also discussed our proposed work which bring outsourcing calculation into IBE interestingly and propose a revocable IBE plan in the server-helped setting. Our plan offloads a large portion of the key era related operations amid key-issuing and key-redesign forms to a Key Update Cloud Service Provider, leaving just a consistent number of basic operations for PKG and clients to perform locally. Moreover, we propose another development which is provable secure under the as of late formulized Refereed handing over of Computation model. Index Terms- 1. INTRODUCTION Identity based encryption system allow any user to generate a public key from a known identity value such as an ASCII string. There is trusted third party, called the Private Key Generator (PKG), who generates the corresponding private keys. For encryption and decryption operations, PKG first publishes a master public key, and then generate the corresponding master private key (referred as master key). Using this master public key, any user can generate a public key corresponding to the identity by combining the master public key with the identity value. To get a corresponding private key, authorized user can use identity ID contacts PKG, which uses the master private key to generate private key for identity ID. As a result, user can encrypt messages with no prior distribution of keys between participants. This is very useful in cases where predistribution of keys is inconvenient because of technical restraints. However, for decryption of message, the authorized user must obtain an appropriate private key from PKG. In this approach the problem is that PKG must be highly trusted, as it has ability to generate any users private key and decryption of message without authorization. Because any user’s private key can be generated using third party’s secret, this system has inherent key assurance. A different systems have been proposed which remove this including certificate-based encryption and secure key issuing cryptography. In PKI setting, revocation is done by appending validity periods to certificates or using combinations of techniques. But, this require management of certificates which is precisely the burden that IBE strives to alleviate. Boneh and Franklin suggested that their private keys can renewed by user periodically and senders use receivers identity with current time period.But this mechanism would results in an overhead at PKG. In another word, all the users even though their keys have been revoked or not, have to contact with private key generator( PKG) periodically to prove their identities and update new private keys. It is needed that PKG must be online and the secure channel has to be maintained for all the transactions, which will become a bottleneck for IBE system as the number of users grows. Many businesses large and ISBN-13: 978-1537584836 www.iaetsd.in Proceedings of ICAER-2016 ©IAETSD 201615
  • 2. small use cloud computing today either directly or indirectly instead of traditional onsite alternatives. There are a number of reasons like Reduction of costs,Universal access and many more because of which cloud computing is so widely used among businesses today. Thus it require a new working paradigm for introducing cloud services into IBE revocation to fix the issue of efficiency and storage overhead. A naive approach is hand over the private key generators (PKG) master key to the Cloud Service Providers (CSPs). The CSPs then simply update all private keys by using the traditional key update technique and transfer the private keys to unrevoked users. However, this approach is based on an unrealistic assumption that CSPs are fully trusted and are allowed to access the master key for IBE system. But, in practice the public clouds are likely outside of the same trusted domain of users and are curious about users individual privacy. For this reason, a challenge is how to design a secure revocable IBE scheme so that we can reduce the overhead computation at PKG with an untrusted CSP is raised. II. RELATED WORK A Identity-Based Encryption (IBE) is an interesting alternative to public key encryption, which simplify key management in a certificate-based Public Key Infrastructure (PKI) with use of human-intelligible identities (e.g., unique name, IP address ,email address,, etc) as a public keys. D. Boneh and M. Franklin propose a fully functional identity-based encryption scheme (IBE). The scheme has chosen ciphertext security in the random oracle model assuming an elliptic curve variant of the computational Diffie-Hellman problem. System is based on the Weil pairing and give precise definitions for secure identity based encryption schemes and give several applications for such systems[1]. A. Sahai and B. Waters introduce a new type of Identity-Based Encryption (IBE) scheme that we call Fuzzy Identity- Based Encryption. In Fuzzy IBE an identity Is viewed as set of descriptive attributes. A Fuzzy IBE scheme allows for a private key for an identity, ID, to decrypt a cipher text encrypted with an identity, ID’ , if and only if the identities ID and ID’,are close to each other as measured by the set overlap distance metric[2]. The availability of fast and reliable Digital Identities is an essential ingredient for the successful implementation of the public-key infrastructure of the Internet. All digital identity schemes must include a method for revoking someone’s digital identity in the case that this identity is stolen (or canceled) before its expiration date (similar to the cancelation of a credit- cards in the case that they are stolen). W. Aiello, S. Lodha, and R. Ostrovsky proposed an elegant method of identity revocation which requires very little communication between users and verifiers in the system They reduced the overall CA to Directory communication, while still maintaining the same tiny user to vendor communication[3].. III.PROPOSED SYSTEM The proposed system is Pseudonym Generation Scheme with Combining the Identity based encryption and Attribute-based Encryption with Outsourced Revocation in Cloud Computing. we use multiple KU- CSP for key updation. For data security, use an efficient encryption algorithm. For integrity checking, generate meta data before upload the data in cloud. Using the meta data the integrity of the file is verified. In proposed work, we design a method in which each user takes a different pseudonym when accessing cloud services. There is almost no relationship between a user identity and a corresponding pseudonym is provided, and no relationship is provided between the pseudonyms for a single. Pseudonym use will not affect users attestation also reduces the amount of input data representing private user information thus making it almost impossible for attackers to attack on users. In cloud data is stored remotely, user is not aware of any security threat. Data modification can done by the untrusted server ,unauthorized user or by some malicious activity. So user needs to be ensured that their data are intact. For this it is important to check integrity of data. for this proposed system generate meta data and using this meta data we examine the accuracy of data. Proposed Algorithms : Pseudonym Generation algorithm 1.User Identity ID is given as intial input. 2.check wether pseudonym is already generated or not. 3.If yes then give message pseudonym is already generated. 4.If not chose type of pseudonym Alpha/Numeric/Alphanumeric. 5.Use random function to generate random number. 6.Generate pseudonym using random number generated in step 5. 7.Return pseudonym. Key Generation Algorithm 1.select randomly two large prime number p,q 2.Compute n=p*q. Where n is modulus used to generate public key and private key. 3.Compute the function as Ψ(n) = (p*1)(q*1). 4.Select any random number e between 1 and (n) the function value previously calculated in step 3 such that the number is co-prime to '(n) and is not divisor of Ψ (n). 5.Calculate d,which represent modular multiplicative ISBN-13: 978-1537584836 www.iaetsd.in Proceedings of ICAER-2016 ©IAETSD 201616
  • 3. inverse of e mod Ψ (n). i.e d should satisfy equation e*d mod Ψ (n) =1. 6.private key is represented by d calculated in step 5. V.RESULTS In this section we present the Module description, how it works, practical results and environment. Pseudonym Generation : we generate pseudonym for each user. It take users identity and provide pseudonym.Pseudonyms are usually taken or adopted to hide an individual ones real identity, for example writers’ pen names, or terrorists, and computer hackers fake names. Actors, musicians, and other performers sometimes uses stage names, for example, to hide their ethnic backgrounds. Here we use pseudonym for hide users real identity. Because KU-CSP is untrusted. So adversaries can use the data without permission based on users identity. So we generate pseudonym. Key Generation : For each users private key request on identity ID, PKG firstly checks whether the request identity ID exists in revocation list RL, if so the key generation is aborted. then it generates Private Key (PK) and Outsourcig Key (OK).finally, it sends Private Key to user and Pseudonym with Outsourcing key to KU- CSP respectively. Encryption : user wants to upload any file or message to KUCSP. But KU-CSP is untrusted. So encryption is compulsory.for security we use attribute based encryption with identity based encryption scheme.Here a user can encrypt a message M under Pseudonym P with attributes and time period Ti. This provides the ciphertext (CT). Then user can upload this ciphertext to KU-CSP. Decryption : user wants to download any file or message from KU-CSP.user uses his private key send by PKG and decrypt the message. Here the ciphertext CT is encrypted under P with attributes and Ti, and the user has a private key PK, this provides original message M. Revocation : If the private keys of some users get compromised, PKG must provide a mean to revoke such users from system.If users with identities in the set that are to be revoked at time period Ti, PKG updates the revocation list as RL as well as the time list TL through linking the newly created time period Ti+1 onto original list TL. Finally send a copy for the updated revocation list RL as well as the new time period Ti+1 to KU-CSP. Key Updation : Upon receiving a key-update request on pseudonym, firstly KU-CSP checks whether ID exists in the revocation list RL, if so KU-CSP returns null and key-update is aborted. Otherwise it returns Updated Key (TK) and keyupdate is KU-CSP fetches the corresponding entry Id with outsourcing key in the user list UL. In this section we provide the Results on basis of Construction of Proposed system. We evaluate Time required to respond by single CSP compared to time required by multiple CSP. VI.CONCLUSION AND FUTURE Focusing on issue of identity revocation, we have introduced outsourcing computation into IBE and proposed a revocable scheme in which the revocation operations are delegated to CSP. User needs not to contact with PKG during key-update, in other words, PKG is allowed to be offline after sending the revocation list to KU-CSP. It do not require secure channel or user authentication during key-update between user and KU-CSP. Furthermore as KUCSP is untrusted we use pseudonym for each user so that adversary can not get real identity of user.we combine the Identitybased and Attribute-based Encryption which will provide more security to user.For integrity checking, generate meta data before upload the data in cloud. Using this meta data the integrity of the file is verified REFERENCES [1] W Aiello, S Lodha, & R Ostrovsky. (1998). Fast digital identity revocation. Advances in Cryptology – CRYPTO’98. Springer. [2] V Goyal. (2007). Certificate revocation using fine grained certificate space partitioning. Financial Cryptography and Data Security (LNCS). Berlin: Springer. Vol. 4886, pp. 247–259. [3] F Elwailly, C Gentry, & Z Ramzan. (2004). Quasimodo: Efficient certificate validation and revocation. Public Key Cryptography (LNCS). Berlin: Springer. Vol. 2947, pp. 375–388. [4] D Boneh, & M Franklin. (2001). Identity-based encryption from the weil pairing. Advances in Cryptology – CRYPTO 2001 (LNCS). Berlin: Springer. Vol. 2139, pp. 213–229. [5] A Boldyreva, V Goyal, & V Kumar. (2008). Identity-based encryption with efficient revocation. ISBN-13: 978-1537584836 www.iaetsd.in Proceedings of ICAER-2016 ©IAETSD 201617
  • 4. In: Proceedings of the 15th ACM Conf. on Comp. and Comm. Security. NewYork: ACM. pp. 417–426. [6] A Sahai, & B Waters. (2005). Fuzzy identity-based encryption. Advances in Cryptology EUROCRYPT 2005 (LNCS). Berlin: Springer. Vol. 3494, pp. 557–557. [7] R Canetti, B Riva, & GN Rothblum. (2011). Two 1- round protocols for delegation of computation. Cryptology ePrint Archive, Report 2011/518. [8] U Feige, & J Kilian. (1997). Making games short. Proceedings of the 29th annual ACM Symp. on Theory of Computing. New York: ACM. pp. 506–516. [9] S Hohenberger, & A Lysyanskaya. (2005). How to securely outsource cryptographic computations. Proceedings of the 2nd Inter. Conf. on Theory of Cryptography. Berlin: Springer- Verlag. pp. 264–282. [10] R Canetti, B Riva, & G Rothblum. (2012). Two protocols for delegation of computation. Information Theoretic Security (LNCS). Berlin: Springer. Vol. 7412, pp. 37–61. [11] X Chen, J Li, J Ma, Q Tang, & W Lou. (2012). New and secure outsourcing algorithms of modular exponentiations. 17th European Symp. on Research in Computer Security, 2012. [12] MJ Atallah, & KB Frikken. (). Securely outsourcing linear algebra computations. Proceedings of the 5th ACM Symp. on Information, Computer and Communications Security. New York: ACM. pp. 48–59. [13] A Shamir. (1985). Identity-based cryptosystems and signature schemes. Advances in Cryptology – CRYPTO (LNCS). Berlin: Springer. Vol. 196, pp. 47–53. [14] C Cocks. (2001). An identity based encryption scheme based on quadratic residues. Cryptography and Coding (LNCS). Berlin: Springer. Vol. 2260, pp. 360–363. ISBN-13: 978-1537584836 www.iaetsd.in Proceedings of ICAER-2016 ©IAETSD 201618